Index: openacs-4/packages/acs-core-docs/www/ext-auth-requirements.adp =================================================================== RCS file: /usr/local/cvsroot/openacs-4/packages/acs-core-docs/www/ext-auth-requirements.adp,v diff -u -r1.1.2.11 -r1.1.2.12 --- openacs-4/packages/acs-core-docs/www/ext-auth-requirements.adp 23 Jun 2016 08:32:45 -0000 1.1.2.11 +++ openacs-4/packages/acs-core-docs/www/ext-auth-requirements.adp 19 Nov 2016 09:21:53 -0000 1.1.2.12 @@ -1,5 +1,5 @@ -{/doc/acs-core-docs {Documentation}} {External Authentication Requirements} +{/doc/acs-core-docs {ACS Core Documentation}} {External Authentication Requirements} External Authentication Requirements External Authentication Requirements

-Vision

People have plenty of usernames and passwords already, we +Vision

People have plenty of usernames and passwords already, we don't want them to have yet another. We want people to be able to log in to OpenACS with the same password they use to log in to any other system.

Besides, administrators have better things to do than create @@ -74,7 +74,7 @@

Requirements

-New API

+New API
@@ -526,7 +526,7 @@ a nice real-time collaboration feature frequently requested by members of the community. This is particularly interesting when integrated with a chat or instant messaging service like -Jabber.

What I'm concretely suggesting is that we keep a record of +Jabber.

What I'm concretely suggesting is that we keep a record of which authenticated users have requested pags on the site in the last x minutes (typically about 5), and thus are considered to be currently online. There's nothing more to it. This lets us @@ -587,7 +587,7 @@ be logged into multiple authorities at the same time. This is useful if, for example, you need to get login tokens such as Kerberos tickets for access to shared resources.

I can see the value in this, but for simplicity's sake, -I'm in favor of keeping this use-case out of the loop until we +I'm in favor of keeping this use-case out of the loop until we have someone with a real requirement who could help us guide development.

For now, OpenACS is still more of an integrated suite, it doesn't access many outside applications. I think it would be @@ -627,7 +627,7 @@ level, so we don't have to write them all ourselves. The downside is that we can't do things like account creation, password management, real-time account synchronization, etc., not -supported by PAM (I'm not entirely sure what is and is not +supported by PAM (I'm not entirely sure what is and is not supported).

  • RADIUS

  • LDAP

  • FeatureStatusDescription
    New API